Scammers – Gridinsoft Blog https://gridinsoft.com/blogs Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Wed, 09 Jul 2025 01:21:54 +0000 en-US hourly 1 https://wordpress.org/?v=6.9 Fortnite V-Bucks Generator Scam: Why ‘Free V-Bucks’ Sites Are Dangerous https://gridinsoft.com/blogs/fortnite-v-bucks-generator-scam/ https://gridinsoft.com/blogs/fortnite-v-bucks-generator-scam/#respond Fri, 13 Jun 2025 23:35:11 +0000 https://gridinsoft.com/blogs/?p=31108 When you see a website promising free Fortnite V-Bucks, you’re looking at a carefully crafted trap. These sites can’t actually generate V-Bucks—that’s technically impossible—but they’re extremely good at stealing your account information, infecting your device with malware, and collecting personal data they can sell to other criminals. Analysis of domains like 750ge.com, Ggfn.us (you can […]

The post Fortnite V-Bucks Generator Scam: Why ‘Free V-Bucks’ Sites Are Dangerous appeared first on Gridinsoft Blog.

]]>
When you see a website promising free Fortnite V-Bucks, you’re looking at a carefully crafted trap. These sites can’t actually generate V-Bucks—that’s technically impossible—but they’re extremely good at stealing your account information, infecting your device with malware, and collecting personal data they can sell to other criminals.

Analysis of domains like 750ge.com, Ggfn.us (you can find more here and here) reveals standard phishing techniques combined with malware distribution mechanisms. The sites exploit Fortnite’s popularity to target users who want free premium content, using social engineering tactics similar to Roblox scams and other online fraud schemes.

Threat Summary

Threat Name “Fortnite V-Bucks Generator” Scam Website
Threat Type Phishing, Scam, Social Engineering, Fraud, Malware Distribution
Fake Claim Users can generate V-Bucks (Fortnite in-game currency) for free
Related Domains 750ge.com, ggfn.us, vbbv.store, vuxgou.com, an1.is, moviezone.shop
Distribution Methods SEO poisoning, compromised websites, malicious ads, social media spam, gaming forums
Target Platforms Windows, macOS, Android, iOS, gaming consoles
Potential Damage Account theft, malware infections, financial loss, identity theft, personal data harvesting
Common Payloads InfoStealer malware, banking trojans, adware, cryptocurrency miners, ransomware

Analysis of domains like 750ge.com, Ggfn.us (you can find more here and here) reveals standard phishing techniques combined with malware distribution mechanisms. The sites exploit Fortnite’s popularity to target users who want free premium content, using social engineering tactics to bypass security awareness.

Fortnite V-Bucks Generator Scam
Example 1: Fake Fortnite V-Bucks Generator

Epic Games has confirmed that no legitimate V-Bucks generators exist outside their official platforms. Any site claiming otherwise is operating a fraud scheme that poses significant security risks to users.

Technical Analysis of V-Bucks Generator Operations

V-Bucks generator sites follow a standardized attack pattern designed to maximize data collection and malware distribution. The process typically involves four stages: initial attraction, credential harvesting, verification exploitation, and payload delivery.

Free Fortnite V-Bucks
Example 2: Free Fortnite V-Bucks Scam

Stage one uses current Fortnite branding and references to recent game updates to establish credibility. Sites often copy official Epic Games visual elements and use domain names that suggest legitimacy while avoiding direct trademark infringement.

Stage two collects user identifiers including Fortnite usernames, platform selections, and desired V-Buck amounts. This data serves multiple purposes: account targeting for future attacks, platform-specific malware selection, and psychological commitment techniques that increase completion rates.

Collect Username and Platform
Stage 2: Collect Username and Platform

Stage three implements “human verification” mechanisms that serve as delivery vectors for malicious content. These include forced mobile app installations, survey completions that harvest personal information, social media sharing requirements that spread the scam, and direct credential capture attempts.

Fake Human Verification
Stage 3: Fake Human Verification

Stage four delivers the actual payload, which varies by target platform and user value assessment. High-value targets may receive banking trojans or cryptocurrency stealers, while general users typically encounter adware or basic information stealers.

Technical Analysis: JavaScript Tracking Infrastructure

Analysis of the 750get.com JavaScript code reveals tracking mechanisms. The site uses immediately invoked function expressions (IIFE) to inject tracking pixels and affiliate identifiers without user knowledge:

(function () {var it_id=4415856;var html="...

The identifier `4415856` appears across multiple domains including both 750get.com and ggfn.us, confirming these sites operate as part of a coordinated criminal network. This shared affiliate tracking code demonstrates centralized infrastructure management, revenue attribution systems, and organized distribution of compromised user data among network participants.

Cross-domain analysis reveals identical JavaScript implementations across the scam network:

// Found on both 750get.com and ggfn.us
(function () {var it_id=4415856;var html="...

This code replication indicates professional criminal operations with standardized tracking infrastructure, shared revenue models, and coordinated technical deployment across multiple domains. The consistent affiliate ID usage allows network operators to track user interactions across different entry points and attribute successful compromises to specific campaign sources.

V-Bucks Infrastructure and Generation Impossibility

V-Bucks are server-side digital tokens managed exclusively through Epic Games’ backend infrastructure. The currency exists as database entries on Epic’s authenticated servers, with all transactions processed through secure API endpoints that require valid authentication tokens and payment verification.

External websites cannot interact with Epic Games’ V-Bucks API because it requires authenticated access through Epic’s OAuth 2.0 implementation, CSRF tokens, and validated payment processor integration. Third-party sites lack the necessary certificates, API keys, and server-side authentication required for legitimate V-Bucks transactions.

Epic’s official documentation specifies four legitimate acquisition methods: direct purchase through authorized platforms, Fortnite Crew subscription, Battle Pass progression rewards, and Save the World mode earnings. All methods require authenticated transactions through Epic’s payment processing system.

Security Risks and Attack Vectors

V-Bucks generator sites present multiple attack vectors targeting user accounts, devices, and personal information. Account compromise occurs through credential theft, session hijacking, and authentication bypass techniques that allow unauthorized access to Epic Games accounts and associated payment methods.

Malware distribution happens primarily through the verification stage, where users download mobile applications or browser extensions containing information stealers, banking trojans, and cryptocurrency wallet extractors. Common families include Stealer-type malware targeting browser credentials, AutoFill data, and local wallet files.

What makes these scams particularly dangerous is how much personal information they collect. Beyond obvious details like your name and email, they’re harvesting your gaming habits, spending patterns, and even information about your friends and family. This data gets sold on dark web marketplaces where criminals pay premium prices for gaming-focused profiles—especially those belonging to young users with access to parents’ payment methods.

These criminal networks don’t just rely on fake websites. They also plant malicious ads on legitimate sites, exploit security holes in web browsers, and even hijack internet traffic to redirect you from real gaming sites to their fake ones. You might think you’re visiting Epic Games’ official website, but end up on a convincing replica designed to steal your login credentials.

! INCIDENT RESPONSE PROTOCOL For users who accessed V-Bucks generator sites 1 Account Security: Revoke all Epic Games sessions, reset password, enable 2FA 2 System Scan: Run full InfoStealer malware scan with updated definitions 3 Browser Cleanup: Clear saved passwords, authentication tokens, browsing data 4 Financial Review: Monitor transactions, dispute unauthorized charges 5 Documentation: Record incident details for law enforcement if needed TIME CRITICAL First 24 hours are crucial for limiting damage scope

Technical Indicators and Domain Analysis

Scam identification relies on specific technical indicators rather than subjective assessment. Domain analysis reveals patterns in DNS registration, SSL certificate authorities, and hosting infrastructure that distinguish legitimate services from fraudulent operations.

Real V-Bucks can only come from a handful of places: Epic Games’ own websites, your console’s official store, or verified app stores like Google Play and the App Store. That’s it. Any other website claiming to sell or give away V-Bucks is lying—they simply don’t have the technical access to Epic’s payment systems that would make this possible.

Infrastructure analysis shows scam sites typically use shared hosting services, generic SSL certificates from free authorities, and domain registrations through privacy services that hide owner information. Legitimate gaming services use dedicated hosting, Extended Validation certificates, and transparent business registration.

URL structure examination reveals additional indicators: legitimate platforms use consistent subdomain patterns, HTTPS enforcement, and standardized API endpoints. Scam sites often employ URL shorteners, mixed HTTP/HTTPS protocols, and randomized path structures to evade detection.

Network behavior analysis shows scam sites frequently redirect users through multiple domains, implement anti-analysis techniques like user-agent filtering, and serve different content based on geographic location or referrer information.

Legitimate V-Bucks Acquisition Methods

Epic Games implements four authenticated V-Bucks acquisition channels, each with specific technical requirements and transaction verification processes. All legitimate methods require authenticated API calls to Epic’s payment processing system with valid user tokens and platform-specific payment verification.

Direct purchase transactions occur through Epic’s payment API integration with authorized payment processors including PayPal, Stripe, and platform-specific billing systems. Transactions require two-factor authentication, encrypted payment token validation, and real-time fraud detection before V-Bucks allocation to user accounts.

Fortnite Crew subscriptions utilize recurring billing APIs that automatically process monthly payments and distribute 1,000 V-Bucks plus Battle Pass access through Epic’s subscription management system. The subscription service validates payment status before each monthly V-Bucks distribution.

Battle Pass V-Bucks distribution happens through Epic’s progression tracking system, which validates challenge completion against server-side records before releasing V-Bucks rewards. The system typically provides 1,300-1,500 V-Bucks for completed Battle Pass progression, requiring 950 V-Bucks initial investment.

Battle Pass 100 V-Bucks
Battle Pass 100 V-Bucks

Save the World mode V-Bucks generation operates through Epic’s PvE progression API, tracking daily login streaks, mission completions, and achievement unlocks. This system validates user progress against anti-cheat systems before distributing V-Bucks rewards through the same secure API used for purchases.

The Broader Gaming Scam Ecosystem

V-Bucks generators represent just one facet of a larger criminal ecosystem targeting gamers. Similar scams exist for virtually every popular game with in-game currency. Roblox Robux generators target younger players, while cryptocurrency-based games face their own unique threats.

What’s frustrating is how well these tactics work. Scammers know that gamers—especially younger ones—desperately want premium content and might take risks to get it for free. They’ve perfected the art of making fake sites look authentic, complete with stolen logos, fake testimonials, and countdown timers that create artificial urgency similar to online shopping scams.

These operations are often international, making law enforcement difficult. Scammers register domains in countries with lax regulations and use hosting providers that don’t verify customer identities. This makes shutting down individual sites a game of whack-a-mole, with new domains appearing as fast as old ones are removed—a pattern we see in Telegram scams and other evolving fraud schemes.

The financial incentives are substantial. A successful scam site can compromise thousands of accounts, each potentially worth hundreds of dollars in stolen content or unauthorized purchases. The personal information collected can be sold to other criminals, creating multiple revenue streams from a single operation. This data often ends up in InfoStealer malware databases used for identity theft and account takeovers.

Protecting Young Gamers

Parents and guardians face particular challenges protecting children from these scams. Young gamers are natural targets because they often lack the experience to recognize sophisticated deception and may not understand the consequences of sharing personal information online. Similar to sextortion scams that target young people, these gaming scams exploit trust and inexperience.

Rather than simply forbidding gaming sites, explaining the reality works better. When kids understand that V-Buck generators are literally impossible—like claiming to print real money on a home printer—they become naturally skeptical. Show them how Epic Games actually makes money (by selling V-Bucks) and why they’d never give that revenue away for free.

Setting up proper account security is crucial. Two-factor authentication should be enabled on all gaming accounts, and parents should receive notifications about account changes and purchases. Many gaming platforms offer parental controls that can limit spending and prevent unauthorized account modifications. Consider using parental control software to monitor and protect young users’ online activities.

Regular conversations about online safety help children feel comfortable reporting suspicious websites or unexpected contact from strangers. Creating an environment where children can ask questions without fear of punishment encourages them to seek help when they encounter potential threats. Teach them to recognize common scam warning signs and social engineering tactics used by cybercriminals.

The Industry Response

Gaming companies have become increasingly active in combating these scams, though their efforts face significant challenges. Epic Games regularly reports scam sites to hosting providers and domain registrars, but new sites appear faster than old ones can be shut down.

Social media platforms have implemented policies against scam advertisements, but enforcement remains inconsistent. YouTube, where many users first encounter these scams, has improved its detection of scam content but still struggles with the volume of new uploads.

The development of blockchain gaming and cryptocurrency integration has created new opportunities for scammers, who now promise free tokens and NFTs alongside traditional in-game currency. This evolution requires constant vigilance from both companies and users.

Industry cooperation has improved, with gaming companies sharing information about scam operations and coordinating responses. However, the international nature of many scam operations limits the effectiveness of legal action.

Taking Action Against Scams

Individual users can contribute to the fight against gaming scams by reporting suspicious sites and content. Epic Games provides official channels for reporting scam sites, and most social media platforms have mechanisms for reporting fraudulent content. Consider also reporting to cybersecurity organizations that track online scam patterns.

If you encounter a V-Buck generator scam, documenting and reporting it helps protect other users. Screenshots of the scam process, domain names, and any associated social media accounts provide valuable information for investigators. Share your experience on gaming forums and communities to warn others about new scam techniques.

Sharing knowledge within gaming communities helps spread awareness. When friends or family members mention “free V-Bucks” opportunities, taking time to explain why these are scams can prevent them from becoming victims. Create a culture of security awareness in your gaming groups.

Installing proper security software like Gridinsoft Anti-malware provides protection against malware distributed through scam sites. While prevention is always preferable, having tools to detect and remove malicious software provides important backup protection.

GridinSoft Anti-Malware main screen

Download and install Anti-Malware by clicking the button below. After the installation, run a Full scan: this will check all the volumes present in the system, including hidden folders and system files. Scanning will take around 15 minutes.

After the scan, you will see the list of detected malicious and unwanted elements. It is possible to adjust the actions that the antimalware program does to each element: click "Advanced mode" and see the options in the drop-down menus. You can also see extended information about each detection - malware type, effects and potential source of infection.

Scan results screen

Click "Clean Now" to start the removal process. Important: removal process may take several minutes when there are a lot of detections. Do not interrupt this process, and you will get your system as clean as new.

Removal finished

Frequently Asked Questions (FAQ)

What is a “Fortnite V-Bucks Generator” scam?

A V-Bucks generator scam is a deceptive website that falsely promises to generate free V-Bucks (Fortnite’s in-game currency) for users. These sites cannot actually generate V-Bucks—which exist only on Epic Games’ secure servers—but instead steal personal information, distribute malware, or redirect users to other scam sites. They exploit the popularity of Fortnite to target users, especially younger players who want premium content without paying.

How do V-Bucks generator scams work?

These scams typically follow a four-stage process: First, they attract users with promises of free V-Bucks using official Fortnite branding. Second, they collect user information like Fortnite usernames and desired V-Buck amounts. Third, they implement fake “human verification” steps that require downloading apps, completing surveys, or sharing personal data. Finally, they deliver malware, steal credentials, or redirect to other fraudulent sites. No actual V-Bucks are ever generated.

How did I encounter a V-Bucks generator scam?

V-Bucks generator scams are promoted through multiple channels including malicious advertisements, compromised websites, SEO poisoning that makes them appear in search results, social media spam, gaming forum posts, and potentially unwanted applications. Some users encounter them through fake CAPTCHA sites or while searching for legitimate Fortnite content.

Why can’t external websites actually generate V-Bucks?

V-Bucks are digital tokens stored exclusively on Epic Games’ secure backend infrastructure. External websites cannot interact with Epic’s V-Bucks API because it requires authenticated access through Epic’s OAuth 2.0 system, CSRF tokens, and validated payment processor integration. Third-party sites lack the necessary certificates, API keys, and server-side authentication. Only Epic Games’ official platforms can create or distribute legitimate V-Bucks.

What should I do if I fell for a V-Bucks generator scam?

If you’ve interacted with a V-Bucks generator scam, take immediate action: Change your Epic Games password and enable two-factor authentication, scan your device with reputable antivirus software like Gridinsoft Anti-malware, clear your browser data and remove suspicious extensions, monitor your financial accounts for unauthorized transactions, and consider placing fraud alerts if you shared personal information. Contact Epic Games support if you suspect your account has been compromised.

How can I protect myself from V-Bucks generator scams?

Protect yourself by understanding that V-Bucks generators are technically impossible, only purchasing V-Bucks through Epic Games’ official channels, avoiding suspicious links and advertisements, keeping your security software updated, enabling two-factor authentication on gaming accounts, and educating young gamers about these scams. Be especially wary of offers that seem too good to be true or require personal information for “verification.”

Are there legitimate ways to get free V-Bucks?

Yes, Epic Games provides several legitimate ways to earn V-Bucks: through Battle Pass progression (which provides more V-Bucks than it costs), Fortnite Crew subscription (1,000 V-Bucks monthly), Save the World mode earnings (daily login rewards and mission completions), and occasional promotional events. All legitimate methods require playing the game and are distributed through Epic’s secure systems.

What types of malware do V-Bucks generator sites distribute?

V-Bucks generator sites commonly distribute InfoStealer malware that harvests browser credentials and personal data, banking trojans targeting financial information, adware that displays unwanted advertisements, cryptocurrency miners that use your device’s resources, and ransomware in severe cases. Mobile users may encounter fake apps that request excessive permissions to access contacts, messages, and device storage.

How can I report V-Bucks generator scams?

Report V-Bucks generator scams through Epic Games’ official reporting channels, your country’s cybercrime reporting center, the hosting provider of the scam website, and social media platforms if the scam was promoted there. Include screenshots, domain names, and any associated social media accounts in your reports to help investigators track and shut down these operations.

Looking Forward

The popularity of Fortnite and similar games means V-Buck generator scams will likely continue evolving. As security awareness increases and platforms improve their detection capabilities, scammers adapt their tactics to maintain effectiveness.

Recent trends include more sophisticated social engineering, better website design, and integration with legitimate-looking payment processors. Some scams now use artificial intelligence to generate more convincing promotional content and social media profiles.

The rise of mobile gaming has created new attack vectors, with scammers developing fake mobile apps that promise free in-game currency. These apps often request extensive permissions that allow access to contacts, messages, and other sensitive information.

Education remains the most effective defense against these evolving threats. Users who understand the basic principles of how games work and why free currency generators are impossible will be protected against current scams and better equipped to recognize new variations.

Conclusion

Here’s the bottom line: V-Buck generators are a technical impossibility masquerading as free money. These sites exist solely to steal your information and infect your devices. They can’t access Epic’s servers, can’t generate real V-Bucks, and can’t deliver on any of their promises.

Epic Games has built their payment system like a digital fortress—with multiple layers of security, encrypted connections, and authentication requirements that no external website can bypass. When scammers claim they can generate V-Bucks, they’re not just lying about their product—they’re lying about basic computer science.

Protecting yourself is straightforward: understand that free V-Buck generators can’t exist, enable two-factor authentication on your gaming accounts, and run security software like Gridinsoft Anti-malware to catch any malware these sites might try to install. Stay informed about common scam tactics and teach others about these threats.

Most importantly, treat V-Bucks like real money—because they are. You wouldn’t trust a random website offering free cash, so don’t trust one offering free gaming currency. When in doubt, stick to Epic Games’ official channels and remember: if it sounds too good to be true, it’s probably designed to steal from you. For more protection strategies, check our guides on spotting digital scams, avoiding cryptocurrency fraud, and protecting against InfoStealer malware.

The post Fortnite V-Bucks Generator Scam: Why ‘Free V-Bucks’ Sites Are Dangerous appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/fortnite-v-bucks-generator-scam/feed/ 0
Investment Scams on Facebook: How Cybercriminals Filter and Target Victims https://gridinsoft.com/blogs/facebook-investment-scams-rdga-domains/ https://gridinsoft.com/blogs/facebook-investment-scams-rdga-domains/#respond Tue, 06 May 2025 19:12:21 +0000 https://gridinsoft.com/blogs/?p=30988 Investment scams continue to evolve in sophistication, with cybercriminals deploying increasingly complex methods to target potential victims. Recent research from DNS threat intelligence firm Infoblox, presented at the RSA Conference in San Francisco, has uncovered two threat actor groups – codenamed “Reckless Rabbit” and “Ruthless Rabbit” – that have been orchestrating elaborate investment scams through […]

The post Investment Scams on Facebook: How Cybercriminals Filter and Target Victims appeared first on Gridinsoft Blog.

]]>
Investment scams continue to evolve in sophistication, with cybercriminals deploying increasingly complex methods to target potential victims. Recent research from DNS threat intelligence firm Infoblox, presented at the RSA Conference in San Francisco, has uncovered two threat actor groups – codenamed “Reckless Rabbit” and “Ruthless Rabbit” – that have been orchestrating elaborate investment scams through Facebook ads, registered domain generation algorithms, and advanced victim filtering techniques.

How These Investment Scams Work

These threat actors have developed a multi-stage approach to lure victims and maximize their success rate:

1. Facebook Ads with Celebrity Endorsements

The scammers create Facebook advertisements that lead to fake news articles featuring celebrity endorsements for fraudulent investment platforms. These ads are carefully crafted to appear legitimate while evading detection:

  • They intersperse malicious ads with regular advertising content related to legitimate products
  • The ads display decoy domains (e.g., “amazon.pl”) that differ from the actual destination domains (e.g., “tyxarai.org”)
  • They use unrelated images to avoid automated detection systems

This technique isn’t entirely new – we’ve observed similar tactics in cryptocurrency recovery scams and other financial fraud schemes.

For example, recent campaigns identified by researchers show multiple sponsored posts from accounts like “Christopher J. Herndon” targeting users with non-English text. The ads typically display innocuous products like sneakers with text in different languages (such as Turkish phrases like “her zevke uygun üretim ayçapabileri” meaning “production capabilities suitable for every taste”), but clicking them leads to scam sites.

These ads typically operate for short periods (around 1-3 hours) before being taken down, only to be replaced by identical ads with new IDs. This rotation technique helps evade Facebook’s detection mechanisms.

2. Advanced Victim Filtering

What makes these operations particularly sophisticated is their victim filtering system:

  • Web forms collect personal information including names, phone numbers, and email addresses
  • The forms sometimes offer to auto-generate passwords, which are used as part of the validation process
  • Backend systems perform HTTP GET requests to legitimate IP validation tools like ipinfo.io, ipgeolocation.io, or ipapi.co
  • Traffic from countries the scammers aren’t interested in (like Afghanistan, Somalia, Liberia, and Madagascar) is filtered out
  • Phone numbers and email addresses are verified for authenticity
  • Advanced Traffic Distribution Systems (TDS) filter out security researchers’ systems, bot traffic, and honeypots

Only targets who pass these validation checks are routed through a traffic distribution system (TDS) to the actual scam platform. If deemed a “high-value” target, victims might receive personalized attention through fake investment representatives or call centers.

Investment Scam Victim Selection Process Facebook Ad Click Fake News Page Form Submission Validation Checks Failed: “Thank You” Page (No Further Action) Passed: Redirect to Scam Platform Call Center Contact (For High-Value Targets) Fail Pass

Source: Infoblox research

3. Registered Domain Generation Algorithms (RDGA)

Both groups employ registered domain generation algorithms to create domains for their fraudulent investment platforms. Unlike traditional domain generation algorithms (DGAs), RDGAs use secret algorithms to register domain names, making them harder to detect and block.

Reckless Rabbit has been creating these domains since at least April 2024, primarily targeting users in Russia, Romania, and Poland. Ruthless Rabbit, active since at least November 2022, runs its own cloaking service (“mcraftdb.tech”) for validation checks, focusing on Eastern European users. According to Infoblox researchers, Ruthless Rabbit appears to be linked to infrastructure in Russia.

According to the original Infoblox research, these RDGA domains play a critical role in the scam infrastructure. Unlike traditional DGAs used by malware for command and control communications, RDGAs are designed specifically for human interaction. The domains are carefully crafted to appear legitimate while allowing the threat actors to rapidly create new infrastructure when existing domains are blocked or blacklisted.

The DNS Infrastructure Behind the Scams

DNS (Domain Name System) plays a pivotal role in these scams. The threat actors leverage DNS in several sophisticated ways:

  • Rapid infrastructure rotation – New domains are continuously registered using algorithmic patterns, allowing quick migration when domains are flagged
  • DNS-based traffic filtering – DNS queries and responses help the scammers identify and filter visitors based on their geographic location and system characteristics
  • Multi-stage redirection chains – Multiple DNS lookups are used in redirection chains to obscure the final destination and complicate tracking by security researchers
  • Separate infrastructure for different scam phases – Different sets of domains handle initial contact, validation, and final conversion stages

Infoblox researchers identified these patterns by analyzing the DNS query patterns associated with the scam operations, revealing the sophisticated infrastructure used to evade traditional security controls.

4. Fraudulent Payment Platforms

Users who pass the validation filters are directed to sophisticated payment platforms designed to harvest financial details. These pages include:

  • Professional-looking interfaces with security badges and encryption claims
  • Multiple payment options including major credit cards (Visa, Mastercard)
  • Secure payment indicators (locks, badges, etc.)
  • Fine print disclaimers that actually reveal the fraudulent nature (but are easily overlooked)

The payment pages often contain deliberately obscured disclaimers in small text that actually reveal the fraudulent nature of the transaction. For example, some may include text stating that the service is “not for investment purposes” or that “this is a subscription to educational content only,” contradicting the investment promises made in earlier stages of the scam.

5. Call Centers for Personalized Scamming

Some campaigns take the deception further by incorporating call centers. After victims pass the validation process, they receive calls from “representatives” who provide detailed instructions on setting up accounts and transferring money to the fraudulent investment platforms.

This human interaction adds credibility to the scam and helps overcome any hesitation the victim might have. It’s similar to tactics we’ve documented in email-based scams where criminals establish a personal connection to build trust.

Technical Indicators of Compromise

Security researchers have identified several technical indicators that can help identify these scam operations:

Indicator Type Details
Domain Patterns Random-looking domains with RDGA patterns, often registered recently
Validation Services Connections to ipinfo.io, ipgeolocation.io, ipapi.co from landing pages
Traffic Distribution Multiple redirects through intermediary domains
Facebook Ad Content Mismatched domain displays (shown vs. actual destination); consistent use of specific names like “Christopher J. Herndon”
Cloaking Infrastructure For Ruthless Rabbit: connections to “mcraftdb.tech”
Ad Patterns Short ad lifetimes (1-3 hours); multiple identical ads with different library IDs

Tactics, Techniques, and Procedures (TTPs)

The Infoblox Threat Intelligence team has documented specific TTPs that distinguish these scam operations:

  • Use of HTTPS encryption – Nearly all scam domains use valid SSL certificates to appear legitimate and avoid detection by security tools that can’t inspect encrypted traffic
  • Domain naming patterns – Domains often incorporate financial or crypto-related terms combined with random elements, such as “investing-profit-group[.]com”
  • Algorithmic domain registration – New domains follow predictable patterns but with sufficient variation to evade simple blocklisting
  • Uniform hosting infrastructure – Similar IP ranges and hosting providers are used across campaigns
  • User-agent and behavior filtering – Advanced scripts detect automated security tools based on browser fingerprinting and user behavior analysis
  • Geofencing capabilities – Traffic is filtered based on IP geolocation, with each campaign targeting specific geographic regions

These indicators can help security teams identify and block these fraudulent operations before users fall victim to them. The Infoblox research suggests implementing DNS-layer security measures that can detect suspicious domain patterns and block connections to newly registered domains with patterns matching known scam infrastructure.

How to Protect Yourself from Investment Scams

To avoid falling victim to these increasingly sophisticated investment scams:

  1. Be skeptical of investment opportunities advertised on social media – Legitimate investment firms rarely advertise high-return opportunities through Facebook ads
  2. Verify celebrity endorsements – Check official channels to confirm if a celebrity is actually associated with an investment platform
  3. Research investment platforms thoroughly – Look for reviews from reputable sources, check regulatory registrations, and verify company information
  4. Be wary of pressure tactics – Scammers often create a false sense of urgency to prevent you from doing proper research
  5. Never share financial or personal information with unverified platforms – Legitimate investment services have proper security measures and transparency
  6. Inspect payment pages carefully – Read all fine print before entering card details, and look for disclaimers that contradict investment promises
  7. Be suspicious of foreign-language ads targeting English speakers – Scammers often use mixed languages to bypass detection systems
  8. Use comprehensive security software that can detect and block connections to malicious domains

Technical Protection Measures

The Infoblox research highlights several technical measures that can provide additional protection against these scams:

  • DNS-layer security – Implement protective DNS services that can detect and block connections to suspicious or newly registered domains
  • Domain age verification – Be cautious of investment platforms using domains registered in the last 30 days
  • Network traffic monitoring – Watch for connections to IP geolocation services followed by redirects to unfamiliar domains
  • Ad blockers – Use reliable ad-blocking extensions to reduce exposure to malicious advertisements
  • Multi-factor authentication – Enable MFA on all financial accounts to prevent unauthorized access even if credentials are compromised

These scams share many characteristics with other online fraud schemes we’ve analyzed, including Facebook scams and Instagram fraud. The common thread is exploiting trust in familiar platforms to lend credibility to the scam.

For Windows users concerned about potential infection from clicking on suspicious links, Gridinsoft Anti-Malware can help scan your system for signs of malware and remove any threats. The browser reset feature is particularly useful if you suspect your browser has been compromised by scam websites.

Investment Scams on Facebook: How Cybercriminals Filter and Target Victims

The Growing Threat of Investment Scams

According to Infoblox researchers, these types of scams have proven highly profitable and will continue to grow rapidly in both number and sophistication. The financial motivation ensures these threats will persist and evolve.

The findings about Reckless Rabbit and Ruthless Rabbit were first reported in April 2025 at the RSA Conference in San Francisco, as covered by SC Magazine UK. Similar schemes have been documented by other security firms. In December 2024, ESET exposed a comparable operation called Nomani that used social media malvertising, company-branded posts, and AI-powered video testimonials featuring famous personalities.

More recently, Spanish authorities arrested six individuals aged between 34 and 57 for allegedly running a large-scale cryptocurrency investment scam that used AI tools to generate deepfake ads featuring popular public figures.

As these scams continue to evolve, staying informed about the latest tactics is crucial for protecting yourself. For more information on recognizing and avoiding online scams, check our guides on identifying scam websites and what to do if you’ve been scammed.

Conclusion

Investment scams using Facebook ads, registered domain generation algorithms, and sophisticated victim filtering represent an evolution in online fraud. By understanding how these scams operate and implementing proper security measures, you can significantly reduce your risk of falling victim to them.

Remember that legitimate investment opportunities don’t require urgent action, guarantee high returns with no risk, or come through unsolicited social media advertisements. Always research thoroughly, verify information independently, and be skeptical of opportunities that seem too good to be true.

The post Investment Scams on Facebook: How Cybercriminals Filter and Target Victims appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/facebook-investment-scams-rdga-domains/feed/ 0
$GROK Presale Scam: Crypto Investment Fraud https://gridinsoft.com/blogs/grok-presale-scam/ https://gridinsoft.com/blogs/grok-presale-scam/#respond Mon, 28 Apr 2025 17:17:31 +0000 https://gridinsoft.com/blogs/?p=30864 The $GROK Presale Scam tricks people into investing in a fake cryptocurrency by using Elon Musk’s name and his Grok AI assistant. Scammers set up legitimate-looking websites and social media posts promising “early access” to a non-existent GROK coin. Once you register and send real cryptocurrency to their wallets, your money vanishes forever. This analysis […]

The post $GROK Presale Scam: Crypto Investment Fraud appeared first on Gridinsoft Blog.

]]>
The $GROK Presale Scam tricks people into investing in a fake cryptocurrency by using Elon Musk’s name and his Grok AI assistant. Scammers set up legitimate-looking websites and social media posts promising “early access” to a non-existent GROK coin. Once you register and send real cryptocurrency to their wallets, your money vanishes forever. This analysis breaks down how the scam works, what red flags to watch for, and what to do if you’ve already fallen for it.

Threat Summary

  • Threat Name: $GROK Presale Coin Scam
  • Type: Cryptocurrency Investment Fraud
  • Distribution Method: Fake Elon Musk social media posts, scam websites
  • Primary Target: Crypto investors, Elon Musk fans, AI enthusiasts
  • Disguised As: Official xAI/Grok Cryptocurrency Launch
  • Primary Domain: coingrok.app (and multiple variants including coingrok.io, groktradeai.com)
  • Fake Token Price: $4.78 per token
  • Impersonation: Elon Musk, xAI
  • Data At Risk: Personal information, cryptocurrency assets
  • Severity: High (you could lose a lot of money)
Example of site with GROK Presale Coin Scam
This isn’t a real Elon Musk project – it’s a scam website designed to steal your crypto

So Elon Musk is Launching a Crypto Coin… Right?

Wrong. Elon isn’t launching any GROK coin, despite what that convincing tweet might say. This scam takes advantage of Musk’s reputation and the hype around his xAI’s Grok assistant to target crypto enthusiasts.

The fraudsters behind this aren’t amateurs. They’ve built fake websites, social posts, and even registration systems that look surprisingly legitimate at first glance.

Let’s break down how this scam works and why it’s fooled so many people already.

How the $GROK Presale Scam Actually Works

$GROK Presale Scam Operation Flow Initial Exposure Social Media/Ads Primary Landing coingrok.app User Registration Data Collection Fake Wallet Secondary Site Fund Transfer Crypto Payment Financial Loss Irreversible Transfer Identity Abuse Data Reselling Secondary Scams Further Targeting Victim Impact • Financial Losses (Transferred Cryptocurrency) • Personal Data Exposure • Cryptowallet Credential Risk

Source: Analysis of $GROK Presale scam operation methodology, 2025

The scam follows a simple but effective playbook. First, you see a social media post that looks like it’s from Elon Musk announcing his exciting new GROK cryptocurrency.

Click the link, and you land on a professional-looking website (usually coingrok.app, coingrok.io, or groktradeai.com). The site claims you’re among the lucky few selected for this “exclusive presale” at the bargain price of $4.78 per token.

The pressure tactics kick in immediately. “83% Target Reached!” warns the site. “Only 1.8K+ participants joined!” Translation: hurry up before all the imaginary tokens are gone.

Initial Engagement - Fabricated Elon Musk Tweet About GROK Coin
This isn’t a real Elon Musk tweet – it’s the first step in the scam

Next comes the registration form asking for your name, email, and a password. This isn’t just for show – they’ll use this data for identity theft or to target you with future scams.

The final trap is the fake crypto wallet interface. It looks legitimate and asks you to transfer real Bitcoin or Ethereum to “secure your allocation.” Once you transfer funds, they’re gone forever – and your “GROK tokens” never arrive.

Know Your Enemy: Technical Details

Domain Indicators

# Confirmed scam domains
coingrok.app
coingrok.io
groktradeai.com

Website Characteristics

These scam sites share common traits. They’re typically hosted on bulletproof servers that ignore takedown requests. They use free SSL certificates to display the padlock in your browser, creating a false sense of security.

The frontend looks polished – usually built with React.js – but the backend functionality is minimal. It exists solely to collect your data and provide wallet addresses for stealing your crypto.

Most telling is what’s missing. No whitepaper, no roadmap, no actual team information, and certainly no regulatory compliance documents.

The Mind Games They’re Playing

Psychological Tactics in $GROK Presale Scam Authority • Elon Musk’s Reputation • xAI/Grok Association Scarcity • Limited Access Claims • Target % Approaching Full Social Proof • “1.8K+ participants joined” • “Community’s all in” Exclusivity • “You’ve been selected” • “Exclusive Presale” FOMO • “Presale’s off to a wild start” • Limited Window Messaging Value Projection • “Future-ready GROK coin” • AI Integration Narrative Technical Legitimacy • “KYC Verified” Claims • “Audited by CertiK” Badges Trust Signals • “Educational Program” • “Secure Transaction” Badges

Source: Analysis of psychological manipulation techniques used in $GROK Presale scam, 2025

These scammers aren’t just tech-savvy – they’re psychology experts. They leverage Elon Musk’s famous name because people automatically trust what he’s associated with. It’s like celebrity endorsement without the celebrity’s permission.

The “83% Target Reached” progress bar creates artificial scarcity. Nobody wants to miss out on the next Bitcoin, right? And claiming “1.8K+ participants joined” makes you think, “Well, all those people can’t be wrong!”

My favorite touch is the “You’ve been selected” messaging. Nothing makes humans feel more special than thinking they’ve been chosen for an exclusive opportunity. It’s the digital equivalent of the “VIP” velvet rope.

The “educational program” framing is particularly clever. It makes the whole operation seem less like a money-grab and more like a community service – like they’re doing you a favor by letting you invest.

How to Spot This Scam From a Mile Away

Rule #1: No legitimate crypto from Elon Musk or xAI exists. If Musk launched a cryptocurrency, you’d hear about it from verified accounts and major news outlets, not random social media posts.

Check the domain name. Is it a weird variation like “grok-coin.xyz” instead of an official company domain? That’s your first red flag.

Urgency is always suspicious. Real investment opportunities don’t disappear in hours. If something is “83% sold out” with a countdown timer, your scam detector should be blaring.

The $4.78 price point is another giveaway. Why would a token allegedly backed by one of the world’s richest men and cutting-edge AI technology be available at such a specific, low price?

Most telling: they ask for direct crypto transfers. Legitimate token sales use established exchanges or payment processors with security measures, not direct wallet transfers.

Protection Is Better Than Cure

Verify everything through official channels. Only trust information from verified accounts (look for that blue checkmark) and official company websites.

Use reputation tools like Website Reputation Checker to identify known scam websites before you interact with them.

Never rush into crypto investments. The more someone pushes you to act quickly, the more suspicious you should be. Real opportunities don’t evaporate overnight.

Use unique passwords for everything. If you accidentally register on a scam site, at least they won’t get access to your other accounts.

Enable two-factor authentication on all your real financial accounts. It’s an extra layer of security that can save your funds even if your password is compromised.

Already Got Scammed? Here’s What to Do

If You Provided Personal Information:

Change your passwords immediately, especially for email and financial accounts. Enable two-factor authentication everywhere you can.

Monitor your financial accounts for suspicious activity. Check your credit reports for unexpected new accounts.

Be on high alert for follow-up scams. Once they know you’re vulnerable, they might target you again with “recovery services” claiming they can get your money back (they can’t).

If You Transferred Cryptocurrency:

Document everything – screenshots of the website, wallet addresses, and transaction IDs. Report the fraud to law enforcement, the FBI’s Internet Crime Complaint Center (IC3), and your local financial authorities.

If you sent funds from an exchange, report the fraud to them immediately. Recovery is unlikely, but reporting helps authorities track these criminals.

Help others avoid the same fate by sharing your experience on social media and crypto forums. There’s no shame in getting scammed – these operations are sophisticated for a reason.

Clean Up Your Digital Life

Even though this is primarily a web scam, it’s wise to do some digital housekeeping after encountering it:

Clear your browser data (cookies, cache, browsing history) and check for any suspicious extensions you didn’t install. Consider resetting your browser to default settings if you notice anything unusual.

Run a system scan with GridinSoft Anti-Malware to catch any potential malware that might have snuck in during your interaction with the scam site.

$GROK Presale Scam: Crypto Investment Fraud

FAQs About the GROK Scam

Is there a real GROK cryptocurrency from Elon Musk?

No. As of April 2025, neither Elon Musk nor xAI have launched any cryptocurrency related to Grok. If they ever do, it would be announced through official channels, not random presale websites.

Can I get my crypto back if I sent it to these scammers?

Unfortunately, no. Cryptocurrency transactions are irreversible by design. Once you send crypto to a scammer’s wallet, it’s typically laundered through multiple wallets immediately, making recovery virtually impossible.

How do I check if a crypto project is legitimate?

Look for a real team with verifiable identities, comprehensive documentation like a whitepaper, an active development community, and announcements from official sources. True projects don’t hide behind urgency and exclusivity.

What other crypto scams should I watch out for?

Similar scams include the X Token Presale scam (fake Twitter crypto) and the iToken Presale scam (fake Apple crypto). The pattern is the same: famous brand + fake exclusivity + urgency = scam.

The Bottom Line

The $GROK Presale scam works because it taps into powerful desires: getting rich quickly and being part of something exclusive. By borrowing Elon Musk’s credibility and the excitement around AI, these scammers create a convincing trap.

Remember the golden rule of investing: if it seems too good to be true, it probably is. No legitimate cryptocurrency launch will pressure you to act immediately or send funds directly to a random wallet.

Stay skeptical, verify everything through official channels, and keep your crypto in your own wallets until you’re 100% certain of what you’re investing in. The real revolution in AI and crypto will happen in broad daylight, not through shady presale websites.

The post $GROK Presale Scam: Crypto Investment Fraud appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/grok-presale-scam/feed/ 0
Scareware: How to Identify, Prevent and Remove It https://gridinsoft.com/blogs/what-is-scareware/ https://gridinsoft.com/blogs/what-is-scareware/#respond Tue, 14 May 2024 18:50:38 +0000 https://gridinsoft.com/blogs/?p=7733 Scareware is a widespread Internet fraud scheme that intimidates victims into buying unnecessary or harmful software taking advantage of their ignorance. Scareware usually exploits fears of having a computer virus on a machine and persuades users to purchase fake security software. Here we’ll regard how this spoof works and how not to get fooled by […]

The post Scareware: How to Identify, Prevent and Remove It appeared first on Gridinsoft Blog.

]]>
Scareware is a widespread Internet fraud scheme that intimidates victims into buying unnecessary or harmful software taking advantage of their ignorance. Scareware usually exploits fears of having a computer virus on a machine and persuades users to purchase fake security software. Here we’ll regard how this spoof works and how not to get fooled by it. Among other things, we’ll touch on threats associated with scareware.

What is Scareware?

Scareware is a scam that plays on fears of inexperienced users. Although computer viruses are an obsolete type of malware, and you will hardly catch one nowadays even if you try, they remain a horror story for people. And the least you know about a threat, the easier it can scare you.

Both trustworthy and scam security products are promoted via advertising. An advertisement of a good solution will respect the customer and make stress on qualities and features of the promoted program. In the worst case – it will explain that there are many threats out there on the Web, and each endpoint needs protection. The scareware, on the contrary, will try convincing you that your computer is already infected with malware. Moreover, pushy ads will insist on immediate installation of the program they represent, as if it were a last chance to cure your pc.

Scareware Banner
An example of a flashing scareware pop-up banner.

The profitability of the scheme is understandable. People get scared, buy the program and feel like the defenders of their computer system. Perhaps later, the apprehension will come that they just threw away their money, but they will no longer be able to get it back. There are usually many victims of such deception, and that is the very thing on which the scam relies.

Sadly, losing money is not the worst thing that can happen. Sometimes such malvertising used as a filter: whoever bought into this definitely does not have an actual antivirus. Accordingly, those agents who do business on the distribution of adware and malware can safely install a bunch of harmful programs on the victim’s device.

How Scareware Works

It all starts with a person suddenly seeing an advertising banner on some website. The banner itself looks like an automatic notification. Novice users may not even understand that they are dealing with an advertisement.

The message usually says that a scan of the user’s computer was carried out, which found infection with dangerous malware. Already here, a knowledgeable person could have laughed because not only is it impossible to scan the device so quickly, but it would also be problematic to do it remotely without preliminary procedures.

But charlatans deal with inexperienced people and therefore continue their psychological attack. The banners usually include very serious-looking malware names, tables, codes, etc. The more serious the picture looks, the stronger the effect. In all its appearance, the message tries to appear automatic. You can see, for example, this caption: “threat level: high“, as if the same plate could give out a reassuring “low“.

Scareware Fake Scan Results
Scareware often renders fake scan results with frightening namedropping.

Such schemes are generally built on a series of psychological techniques. Intimidation is only the first of them. The use of colors plays with the victim’s emotions. Red stands for anything related to threats. As soon as the “rescue” program enters the scene, a soothing blue or green color appears. This feeling of possible safety encourages the user to make a purchase. In addition, the price is low. Most scareware schemes rely on the possibility of quick payments combined with a vast number of buyers.

Alternative Scams

There may be more time-consuming schemes for the crooks. For example, they might launch a massive campaign offering free device scans. To take one, the user must first download the software, the functionality of which will be limited until the program is purchased. So that this payment is still made, the scan will produce frightening results. This approach counts on more educated users.

By the way, the scope of scareware is not limited to the security sector. You can imagine other types of scareware, such as cleaners, that will scare users by saying: “look, a little more, and your system will get so clogged with the garbage that the device will start freezing.” The advertised program will be able to delete unused applications, temporary files, etc.

The programs in question can remain completely fake without an iota of the promised functionality. All “treatment” of the device, just like the initial intimidation, can be just a visual effect.

What are The Threats?

Theoretically, the victim of scareware could get lucky, and the only problem would be the wasted money. But more often than not, a deceptive program will leave an unpleasant payload behind. Its severity may vary. In fact, it corresponds to the degree of danger from the unwanted or overtly malicious software that scareware can fetch onto the victim’s computer. In most cases, installing a scareware application will decrease the PC’s running speed. We’ll be coming from the guess that scareware developers want understandable profit from their victims, not reduced to the price of the application.

This goal implies infecting the device with either of the malware types:

  • Adware is a class of relatively harmless unwanted applications. They flood users with ad banners, modify browsers’ settings, add ad links on webpages, etc.
  • Spyware is a more significant threat. Hidden software collects information about the system and the user’s activity to send it to people who can commercially benefit from having it. o
  • Miners are the programs that steal computing resources of the victim’s machine and throw them at mining cryptocurrency (for somebody else, of course.) The injured side will also be surprised by the electricity consumption rate.
  • Cybercriminals can add the infected device to the botnet, a controlled network, to perform certain activities on the web unbeknownst to the user.
  • Ransomware is probably the worst case. This malware encodes all data files on the victim’s computer, and the only chance to get them back is to buy a key from the racketeers.

Criminals can drop many other types of malware into the unaware victim’s system. However, those are more suitable for targeted attacks and require hackers’ special attention. The malware mentioned above can work and bring profit automatically.

Scareware: How to Identify, Prevent and Remove It

How not to be fooled by scareware?

  • Install an modern antivirus software. GridinSoft Anti-Malware is one of the best solutions on the market due to the combination of technical efficiency and cost-effectiveness. Its virus libraries are regularly updated so that whichever malware becomes recognized in the world, Anti-Malware will know how to deal with it. The program can perform a deep scanning, work in on-run protection mode, and be a security measure for safe Internet browsing.
  • Know right before you get scammed. The scareware schemes work only because of people’s ignorance. You don’t need to be a hacker or even an advanced user. Just take a simple course on Internet surfing from someone more experienced in it.
  • Don’t visit dubious websites and avoid clicking on ad banners whatsoever. You can hardly encounter malicious advertising, which scareware surely is, on trustworthy websites like Google, Youtube or Facebook. It’s not that you should limit your surfing to these three sites, but they can serve as an example of a trustworthy website appearance. As soon as you see ad banners popping up all around you, flashing and glaring, proceed with great caution if you need to.
  • Install ad-blocking software. It goes as an extension to your browser that blocks advertising banners from rendering. It might save you a lot of nerve cells.
  • If you happen to buy a scareware product, make sure you remove it as you usually remove an application. In Windows, press Start > Settings > Apps > Apps & Features Choose the app you want to remove, and then select Uninstall. After removing the scareware, carry out an antivirus scan to get rid of any accompanying malware.

The post Scareware: How to Identify, Prevent and Remove It appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/what-is-scareware/feed/ 0
Pornographic Virus Alert From Microsoft https://gridinsoft.com/blogs/pornographic-virus-alert-from-microsoft/ https://gridinsoft.com/blogs/pornographic-virus-alert-from-microsoft/#respond Tue, 14 May 2024 13:11:10 +0000 https://blog.gridinsoft.com/?p=5212 Microsoft shows you the banner which states that your PC is infected with a “Pornographic virus”? It seems that someone wants to involve you in a popular online tech support scam, called “Pornographic virus alert from Microsoft”. But how can they do it with a single banner? That article will show you the whole mechanism […]

The post Pornographic Virus Alert From Microsoft appeared first on Gridinsoft Blog.

]]>
Microsoft shows you the banner which states that your PC is infected with a “Pornographic virus”? It seems that someone wants to involve you in a popular online tech support scam1, called “Pornographic virus alert from Microsoft”.

But how can they do it with a single banner? That article will show you the whole mechanism and will also explain why this notification appears so obsessively.

Pornographic virus alert from Microsoft: How it works and why is it malicious?

Once upon a time, after opening the browser, you may see the banner which says that your PC is infected with awful viruses. As you can suppose by the name of this alert, it also states that this virus got on your PC from pornographic websites. To eliminate this malware, “Microsoft” offers you to contact their support by the number they specified in the text. As they assure you, you cannot fix your computer without calling support. And here is the first suspicious element – times when the viruses may get into the PC exactly after opening the website are gone.

It was possible at the beginning of the ’00s when the browsers were raw and had a huge amount of vulnerabilities. One of these security breaches allowed to start of file downloads and installations without the user allowance. But hold on, here are more interesting moments.

Pornographic virus alert from Microsoft banner
The appearance of pornographic virus alert from Microsoft banner

Calling the support as a sign of the malevolency of this banner

First thing is the number this banner offers as an official Microsoft helpline to reactivate your Windows. It is completely different from the one which is published on the Microsoft website. When you call this number, you will hear a “support” that will offer you to grant him remote access to your PC. Sometimes, such action is needed – when some of the program components are working wrong on the specific PC configuration. But when we are talking about the viruses, which are already detected (as the banner says), the need for a remote connection to your PC is very questionable.

Finally, things are getting really ridiculous. The support checks your PC and then says that you really have a lot of viruses. To remove them, you need to install a perfect solution they can offer you only today – an unknown (or low-trusted) antivirus. They can send you a link or even install it themselves, using the remote control. Installing the unknown software was never a pleasant experience. And all these strange moments surely show that this thing is not one you can trust. Usually, the program this “support” offers you is an example of typical scareware. This sort of program mimics the antivirus app and shows you tons of false detections.

The total possible danger of pornographic virus alert from Microsoft

Let’s count. The first danger the user carries is remote access. The user who gets the ability to manage your PC can do everything literally – delete your files, modify your settings, install any programs from any sources – he is a king now. Granting remote access must always be well-weighted because of the dangers it carries. Nonetheless, a lot of users ignore that security rule and give access to anyone who offers help.

Pornographic Virus Alert From Microsoft

Moving on. Scareware may look like a considerably non-dangerous but annoying app. But let this app stay active in your system for about 30 minutes, and you will not be able to use the PC as usual. Because of its malevolent nature, this unwanted program randomly blocks the elements of important applications. Hence, you can’t use the program as usual. To remove these “malicious and vulnerable items”, you need to purchase the full version of this pseudo-antivirus. Moreover, you can’t uninstall a program as usual – through the application list. Manual removal or antimalware software usage is the only option.

Scareware blocked the Photoshop
Example of Scareware

Danger #0. Source malware.

And the last one, which must be the first. I have missed mentioning the initiator of that event – adware. The pornographic virus alert from Microsoft cannot appear independently on your PC. Access to this page will just be blocked by the web browser you use. So, it is quite easy to conclude that something changed your browser configuration and networking settings to show you this banner every time you open your web browser. Adware is a kind of virus that usually does the same, that’s why I supposed it’s present. The way you get this virus on your PC may be different, and you can read the removal guide in that post. Fortunately, the adware can easily be removed with anti-malware software.

The thing you can do to get rid of the banner at the moment is to close the browser window or reboot the PC. Radical ways, but pretty effective against this sort of scam. Usually, that banner does not have any “close” buttons at the top right corner. Don’t worry – the notifications that “Microsoft Locked This Computer” are 100% lies. Still, neither viruses nor companies can block the computer through the Chrome browser. To prevent the browser appearance it is better to avoid using dubious sites. Things like torrent trackers or sites for YouTube videos downloading may redirect you to other pages, and this nasty thing is just among them.

The post Pornographic Virus Alert From Microsoft appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/pornographic-virus-alert-from-microsoft/feed/ 0
Nine Web Scammers Arrested by Dutch Police in a Europol Operation https://gridinsoft.com/blogs/belgian-operation-scammers/ https://gridinsoft.com/blogs/belgian-operation-scammers/#respond Thu, 23 Jun 2022 12:12:46 +0000 https://gridinsoft.com/blogs/?p=8799 Nine Internet scammers arrested in the Netherlands during Dutch-Belgian joint operation Belgium and the Netherlands have conducted a Europol-supported operation to neutralize a group of cybercriminals. Malefactors made millions of euros with phishing and other fraudulent schemes. The operation was carried out by Belgium and Netherlands police with the support of Europol. The Dutch police […]

The post Nine Web Scammers Arrested by Dutch Police in a Europol Operation appeared first on Gridinsoft Blog.

]]>
Nine Internet scammers arrested in the Netherlands during Dutch-Belgian joint operation

Belgium and the Netherlands have conducted a Europol-supported operation to neutralize a group of cybercriminals. Malefactors made millions of euros with phishing and other fraudulent schemes.

The operation was carried out by Belgium and Netherlands police with the support of Europol. The Dutch police have arrested nine people aged between 25 and 36, eight men and a woman. The authorities have also searched 24 houses throughout the country.

The police have confiscated firearms, electronic devices, jewelry, and cryptocurrency from the suspects. The Belgian authorities initially started the investigation, so the individuals arrested in the Netherlands will be extradited to Belgium.

According to the police evidence, the suspects did phishing and other Internet scams that allowed them to make millions of euros. Cybercriminals sent emails, text messages, and WhatsApp messages to their victims. The SMS and letters contained a link to a spoofed bank website made for collecting users’ credentials. After getting these data, the crooks gained access to their victims’ bank accounts.

Europol report states that the frauds used mules to transfer and cash out funds from the victim’s accounts. The gang members have also turned out to be connected to illegal firearms and drug trafficking.

The post Nine Web Scammers Arrested by Dutch Police in a Europol Operation appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/belgian-operation-scammers/feed/ 0
Around 2000 People Arrested by Interpol for Internet Scams https://gridinsoft.com/blogs/interpol-operation-first-light/ https://gridinsoft.com/blogs/interpol-operation-first-light/#respond Thu, 16 Jun 2022 19:29:40 +0000 https://gridinsoft.com/blogs/?p=8614 Operation “First Light” The war on cybercrime goes on. As its next round unwinds in 2022, Interpol arrests hundreds of Internet-fraud-related suspects within two months. The operation in question got dubbed First Light and concentrated on raiding illegal call centers in different countries, with the seized funds amounting to $50 million in assets. These offices […]

The post Around 2000 People Arrested by Interpol for Internet Scams appeared first on Gridinsoft Blog.

]]>
Operation “First Light”

The war on cybercrime goes on. As its next round unwinds in 2022, Interpol arrests hundreds of Internet-fraud-related suspects within two months.

The operation in question got dubbed First Light and concentrated on raiding illegal call centers in different countries, with the seized funds amounting to $50 million in assets. These offices were bases and control centers for a series of socially engineered fraudulent activities on the Internet via email and phone, including date scams.

Police of Singapore have raided money launderers and scammers performing flagrant staged kidnappings. The most bizarre case was an interrupted fraud involving a minor victim already lured into playing kidnapped and fake being beaten. The €1.5 million ransom was ready to be paid, but luckily law enforcement agents were there on time. They managed not only to prevent this transaction but also to arrest about 4,000 bank accounts used to service fraudulent operations.

Another suspect was a Chinese citizen captured in Papua New Guinea. He is believed to be a leader of a gang that fished up to €34 million out of 24 thousand victims of their Ponzi scheme. The suspect is repatriated for trial.

The scams like these are conducted in vast numbers and are highly difficult to track because their authors and victims reside in different countries and the schemes of the crooks are ever-changing. The First Light operation lasted two months and involved police activities in 76 countries.

Rory Corcoran, the head of Interpol’s financial crime division, has noted that the nature of such crimes requires cooperation among many nations’ law enforcement agencies. The First Light operation has proved the effectiveness of such an approach as authorities from all the countries that took part in the procedure shared information on questionable financial transactions, phone numbers, scam websites, IP addresses, etc. The juxtaposition of the gathered materials eventually allowed to carry out a coordinated across-the-world operation.

The post Around 2000 People Arrested by Interpol for Internet Scams appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/interpol-operation-first-light/feed/ 0
Beware: New SpaceX Bitcoin Giveaway Scam https://gridinsoft.com/blogs/spacex-bitcoin-scam/ https://gridinsoft.com/blogs/spacex-bitcoin-scam/#respond Thu, 09 Jun 2022 19:36:52 +0000 https://gridinsoft.com/blogs/?p=8419 Crooks Make Elon Musk a Bait for Wannabe Cryptotraders Scammers again use SpaceX as a bait in fraudulent schemes. The statements of Elon Musk, CEO of the company, have been watched for a long time, and as soon as he says something about cryptocurrency, this immediately gives rise to a lot of food for fraudulent […]

The post Beware: New SpaceX Bitcoin Giveaway Scam appeared first on Gridinsoft Blog.

]]>
Crooks Make Elon Musk a Bait for Wannabe Cryptotraders

Scammers again use SpaceX as a bait in fraudulent schemes. The statements of Elon Musk, CEO of the company, have been watched for a long time, and as soon as he says something about cryptocurrency, this immediately gives rise to a lot of food for fraudulent schemes. Some scammers make expensive fakes, while others make do with little. Before the story of DeepFake Elon telling how to invest in the BitVex cryptocurrency platform had died down, a low-end legend of the same type had already appeared.

This time we are talking about the fake site spacex-btc[.]org. This site pretends to be SpaceX’s dedicated platform for some kind of cryptocurrency giveaway that should help people make money by trading on cryptocurrency price fluctuations. This website may be redirected to by banner ads from apparently not the most reliable websites.

So, first of all, let’s say it: it’s a FAKE.

And don’t be fooled by the fact that this website has an SSL certificate. Do not look at HTTPS in the line, but the very name of the site: spacex-btc. Yes, and with TLD org. This site is a pure spoof because this cowboy office has no connection with the authentic SpaceX website or company.

The site has a decent design, but it’s still not stylish enough for a company like SpaceX. If you look for flaws, you can immediately notice grammatical errors in the fake quote of Musk himself and the terrible layout of the page.

There is a chat button in the corner of the window. Of course, everything connected to luring money is performed perfectly in such offices. You can probably talk to them, and they probably have a call center. But don’t let that fool you. It may seem that no one will find it profitable to create an entire call center to ensure the credibility of a single fake page. But we must remember that the companies behind such scams work with many schemes at once, giving rise to deception on an industrial scale.

These websites have only one purpose – to get money from you. In 99.99% of cases, Forex-like deals in cryptocurrency that these companies advertise are done through the mediator, so you don’t even see your purchased cryptocurrency. Then a psychological game starts: the trading can be random at best. However, in the worst cases, scammers totally control the process. They can make their victims feel lucky and lure more and more money out of them.

Don’t buy into famous faces in advertising campaigns. If you are told that Elon Musk is launching his cryptocurrency or something like that, first check in the news if this is true.

The post Beware: New SpaceX Bitcoin Giveaway Scam appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/spacex-bitcoin-scam/feed/ 0
Three Online Scammers Arrested in Nigeria in an Interpol’s Operation https://gridinsoft.com/blogs/online-frauds-arrest-nigeria/ https://gridinsoft.com/blogs/online-frauds-arrest-nigeria/#respond Wed, 01 Jun 2022 18:37:48 +0000 https://gridinsoft.com/blogs/?p=8239 North Africa, Southeast Asia, and Middle East oil and gas companies became cyberfraud victims. Interpol arrested three citizens of Nigeria in the country’s capital city Lagos as a part of an international operation dubbed Killer Bee. The men were suspected of using Agent Tesla remote administration tools (RAT) to redirect financial operations and corporate classified […]

The post Three Online Scammers Arrested in Nigeria in an Interpol’s Operation appeared first on Gridinsoft Blog.

]]>
North Africa, Southeast Asia, and Middle East oil and gas companies became cyberfraud victims.

Interpol arrested three citizens of Nigeria in the country’s capital city Lagos as a part of an international operation dubbed Killer Bee. The men were suspected of using Agent Tesla remote administration tools (RAT) to redirect financial operations and corporate classified data theft. The search showed that the suspects had fake documents, including invoices and official letters.

Agent Tesla showed up for the first time in 2014. It is an extremely popular RAT-Trojan used for credential stealing, keylogging, clipboard data obtaining, and collecting other information from the victims. Cybercriminal syndicates and stand-alone hackers use Agent Tesla widely because of its stability, flexibility, and broad functionality.

The headquarters of the General Secretariat and the National central bureau of Interpol, together with law-enforcement agencies in 11 South Asian countries, took part in the Killer Bee operation.

Three Suspects of Killer Bee
The three suspects. Omorume below.
Photo: INTERPOL

Hendrix Omorume – one of the three suspects has already been charged and convicted for three episodes of financial fraud, and he faces a year in jail. The two other Nigerians are now under trial.

“Through its global police network and constant monitoring of cyberspace, Interpol had the globally sourced intelligence needed to alert Nigeria to a serious security threat where millions could have been lost without swift police action,” – Craig Jones, the Interpol’s Director of Cybercrime stated. He added: “Further arrests and prosecutions are foreseen worldwide as intelligence continues to come in and investigations unfold.”

The post Three Online Scammers Arrested in Nigeria in an Interpol’s Operation appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/online-frauds-arrest-nigeria/feed/ 0
Scammers distribute fake Windows 11 installers https://gridinsoft.com/blogs/scammers-distribute-fake-windows-11-installers/ https://gridinsoft.com/blogs/scammers-distribute-fake-windows-11-installers/#respond Mon, 26 Jul 2021 16:24:44 +0000 https://blog.gridinsoft.com/?p=5740 Fraudsters explore curiosity about the release of Windows 11 to distribute fake OS installers stuffed with malware, adware and other threats, Kaspersky Lab reports. Despite the fact that the process of downloading and installing Windows 11 from the official Microsoft website is very simple and straightforward, the researchers say that many are still trying to […]

The post Scammers distribute fake Windows 11 installers appeared first on Gridinsoft Blog.

]]>
Fraudsters explore curiosity about the release of Windows 11 to distribute fake OS installers stuffed with malware, adware and other threats, Kaspersky Lab reports.

Despite the fact that the process of downloading and installing Windows 11 from the official Microsoft website is very simple and straightforward, the researchers say that many are still trying to download the new OS from third-party sources, and cybercriminals are happy to offer such people their “services”.

Hiding behind Windows 11, cybercriminals most often distribute malware downloaders designed to deliver other malware to victims’ computers.

Also, Microsoft’s new SO is used to directly distribute other payloads, ranging from adware (which in most cases is considered harmless) to much more dangerous Trojans, malware to steal passwords, and so on.the researchers write.

For example, scammers distribute a certain executable file called 86307_windows 11 build 21996.1 x64 + activator.exe, which weighs as much as 1.75 GB, so that it seems to the user that the operating system can really have such a volume. In fact, the bulk of this volume is occupied by a certain file with the extension .dll, which contains a lot of useless information that is not used in any way during the installation.

fake Windows 11 installers

If you open such an executable file, the installer will start, which looks like a normal installation wizard for Windows. Its main purpose is to download and run a second, more interesting file. It is also an installer, and it even has a license agreement, which says that along with the “download manager for 86307_windows 11 build 21996.1 x64 + activator”, a number of “sponsored programs” will be installed on the computer.

Researchers remind that currently Windows 11 is available only to members of the Windows Insider program, that is, to install it, you first need to register in this program.

You will also need a device with Windows 10 already installed. On that device, go to Settings, click on Updates and Security, and then select Windows Insider and activate the Dev Channel there to get an update to Windows 11.

Let me remind you that I also recently talked about the fact that Vulnerability in Windows 10 could allow gaining administrator privileges.

The post Scammers distribute fake Windows 11 installers appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/scammers-distribute-fake-windows-11-installers/feed/ 0
Fake cryptocurrency giveaways on behalf of Elon Musk brought scammers $580,000 https://gridinsoft.com/blogs/fake-cryptocurrency-giveaways-on-behalf-of-elon-musk-brought-scammers-580000/ https://gridinsoft.com/blogs/fake-cryptocurrency-giveaways-on-behalf-of-elon-musk-brought-scammers-580000/#respond Fri, 15 Jan 2021 16:26:10 +0000 https://blog.gridinsoft.com/?p=4990 The media have repeatedly written that scammers sometimes impersonate famous people. For example, last year, cybercriminals arranged fake giveaways of cryptocurrency on behalf of Elon Musk or SpaceX that had hard consequences for naive users. In particular, criminals are very fond of conducting fake distributions of cryptocurrencies on social networks on behalf of Mask, promising […]

The post Fake cryptocurrency giveaways on behalf of Elon Musk brought scammers $580,000 appeared first on Gridinsoft Blog.

]]>
The media have repeatedly written that scammers sometimes impersonate famous people. For example, last year, cybercriminals arranged fake giveaways of cryptocurrency on behalf of Elon Musk or SpaceX that had hard consequences for naive users.

In particular, criminals are very fond of conducting fake distributions of cryptocurrencies on social networks on behalf of Mask, promising users huge profits, if they first send them some bitcoins.

For example, in 2018, such Twitter action brought scammers over $180,000 in just one day.

Although years are passing, and many famous people have got check marks for account verification and even unambiguous postscripts in the spirit of “I don’t distribute cryptocurrency!”, Many users still believe in such fakes, and assume that Elon Musk, the Winklevoss brothers, Bill Gates and other famous personalities can indeed give out bitcoins to everyone.say Bleeping Computer journalists.

This statement is confirmed by their fresh material in Bleeping Computer, in which journalists report that such activity has become more frequent again, and the scammers have already managed to make good money.

The spike in fraudulent activity on Twitter was highlighted by a MalwareHunterTeam researcher. He said that more and more verified accounts are hacked, and then hackers use them to promote another fake distribution of cryptocurrency on behalf of Elon Musk.

Examples of such scams can be seen on the screenshots below.

cryptocurrency giveaways of Elon Musk

Typically, these tweets contain links that redirect victims to Medium, where the article advertises a fake bitcoin giveaway. The scheme is still simple: users are asked to send a certain amount of cryptocurrency, promising to return the already doubled amount back.

MalwareHunterTeam and BleepingComputer report that most of the accounts compromised during this scam have been inactive for a long time.

Investigators also remind that last year, after a large-scale attack, Twitter abandoned the versioning of accounts, and now such accounts are in even greater demand among cybercriminals, and a real hunt for inactive accounts is under way.

According to BleepingComputer and MetaMask, the scammers receive more than $580,000 in Bitcoin per week. At the same time, the fraud with the distribution of Etherium did not bring such success, and the criminals “earned” only $2,700 on it.

Let me remind you that Elon Musk confirmed that the Russian offered a Tesla employee a million dollars for hacking the company.

The post Fake cryptocurrency giveaways on behalf of Elon Musk brought scammers $580,000 appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/fake-cryptocurrency-giveaways-on-behalf-of-elon-musk-brought-scammers-580000/feed/ 0
Who stands behind cyberattacks? Top 5 types of attackers https://gridinsoft.com/blogs/who-stands-behind-cyberattacks-top-5-types-of-attackers/ https://gridinsoft.com/blogs/who-stands-behind-cyberattacks-top-5-types-of-attackers/#respond Fri, 17 Aug 2018 09:34:37 +0000 https://blog.gridinsoft.com/?p=2940 When accessing the internet, we are often introduced to seemingly wonderful websites, which we think would assist us with our internet surfing, and we often fall into the trap of thinking that these websites are save to use. In addition to that, it is advisable to us to install a number of web applications to […]

The post Who stands behind cyberattacks? Top 5 types of attackers appeared first on Gridinsoft Blog.

]]>
When accessing the internet, we are often introduced to seemingly wonderful websites, which we think would assist us with our internet surfing, and we often fall into the trap of thinking that these websites are save to use. In addition to that, it is advisable to us to install a number of web applications to our computers to meet a number of certain requirements; however, a majority of these web applications and websites are responsible for making our computers and networking system susceptible to cyber-attacks, which could be detrimental to the integrity of our computer systems.

So, who initiates cyber-attacks? Cybercriminals, alternatively known as, cyber hackers, are responsible for hacking into your computer systems for the purpose of stealing or destroying information, which could benefit them. They latch onto vulnerable web applications, which makes it easy for them to install a malware virus to your computer system. Committing a cyber-crime is a federal offense, which warrants the arrest of the cyber-criminal by the authorities.

Picture2 1 Who stands behind cyberattacks? Top 5 types of attackers

The occurrence of cyber-attacks has provoked the data security professionals to take initiatives to trace the location of the cyber-attacker, and they work with a team of security to warrant the arrest of the cyber-criminal. A cyber-attacker could be responsible for navigating high-classified or regular data; however, a number of proactive measurements should be taken against the cyber-attacker to reduce the probability of a cybercrime. We have compiled a list of the top five types of attackers, who are responsible for hacking your computer’s systems and database for stealing data and classified information:

Scammers:

Scammers are the most common type of cybercriminals. They are responsible for sending discount codes and lucrative offers to your email box, which sets as a trap to hack your network system. You will often find a banner claiming to earn you a million dollars overnight, and a number of people are naïve enough to click on, which alleviates the strength of their security networks to help the hacker maneuver into your computer systems.

Script Kiddie:

As depicted by its name, script kiddies are juvenile cyber-criminals, and they use an alternative approach to hack your computer systems. They generally copy a code, which is later converted into a SQL virus. In other terms, a script kiddie is not vastly familiar with using malware to hack into your computer system; instead, they resort to using existing codes to hack into your computers. If a script kiddie hacker was familiar with the tools to hack into computer systems, it would categorize him as a ‘Green Hat’ hacker.

Picture3 1 Who stands behind cyberattacks? Top 5 types of attackers

White Hat

The white hat hackers are alternatively known as ethical hackers, and they are more focused on benefiting the user of a networking system. They play a contributing role in helping you remove viruses and perform pen tests to help people understand the vulnerabilities in their computer systems. A majority of the white hat hackers are responsible for asking security-related questions, and they are required to pursue a qualification in CREST Certified Infrastructure Tester, CREST Certified Application Security Tester, and Offensive Security Certified Professional (OSCP) to become white hat hackers.

Pishers:

Pishers are more likely to trick you into submitting your personal information to hack your computer systems. They often send you a link to fraudulent websites, which makes it easier for them to hack into your computer and networking systems. You should refrain from opening such scam links, and you should instantly report the incident to a cyber-security authority to avoid the occurrence of any illicit activity.

Insiders:

Insiders are considered to be the most dangerous types of hackers as they are responsible for facilitating 20% of the threat, which results in nearly 80% of the damage. As suggested by their name, they often work within an organization, and they use their expertise in hacking to hack the systems of the organization to acquire classified and financial information about the business. The insiders are also responsible for hacking into the classified information of a business’s competitors.

The post Who stands behind cyberattacks? Top 5 types of attackers appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/who-stands-behind-cyberattacks-top-5-types-of-attackers/feed/ 0